Posted
by
timothy
on Sunday August 10, 2014 @05:55PM
from the wifi-password-|"pl[\'as[cnp dept.

MojoKid (1002251) writes "Security researcher Gene Bransfield, with the help of his wife's grandmother's cat, decided to see how many neighborhood WiFi access points he could map and potentially compromise. With a collar loaded with a Spark chip, a Wi-Fi module, a GPS module, and a battery, Coco the cat helped Gene identify Wi-Fi networks around the neighborhood and then reported back. The goal here is obvious: Discover all of the unsecured, or at least poorly-secured, wireless access points around the neighborhood. During his journey, Coco identified dozens of Wi-Fi networks, with four of them using easily-broken WEP security, and another four that had no security at all. Gene has dubbed his collar the "WarKitteh", and it cost him less than $100 to make. He admits that such a collar isn't a security threat, but more of a goofy hack. Of course, it could be used for shadier purposes." (Here's Wired's article on the connected cat-collar.)

Just because a lock is weak doesn't give you the right to break it and enter the place. That argument wouldn't stand in court for physical access, stop deluding yourself that you have the "right" to access WEP-secured networks.

Cats can wander around without arousing much suspicion. In residential areas, that includes going into front and back yards. In commercial areas, that includes going into secured lots. In that respect, cats would be able to perform better. Of course, that leaves the issue of getting cats to explore areas that you're interested in in the first place.

Open Wireless points are a security threat. Fullstop. Tor is a security threat, and you are not innocent by leaving open wireless points or Tor nodes. All it does is say you have something to hide, abut are choosing to hide in plain sight.

A mesh network of open wireless point that has -NO- direct internet access is a better concept. Sure you're not going to get half a megabit or low latency, but it solves the question of how to hide in plain sight. All leaving open access points does is let pirates and pedophiles drown the access node until whoever is providing the access gets subpoena'd or the ISP cuts it off for other abuse reasons like spam.

If you've ever used the open WiFi at Starbucks or McDonalds you'd notice that the connection capacity is not very high, and you usually can't access SMTP or Youtube.

When someone does the same over your secured connection, either because you shared your password with the wrong friends, someone guessed your password, or you got hacked, good luck explaining to a jury that it's possible for others to use your secured connection.

It's kind of like giving the Coke machine down the hall an IP address with sensors.... 'why' becomes such an unimaginative and mundane question in such scenarios, and if pressed, can simply be answered with, "Because I can."